InfoSci®-Journals Annual Subscription Price for New Customers: As Low As US$ 4,950

This collection of over 175 e-journals offers unlimited access to highly-cited, forward-thinking content in full-text PDF and XML with no DRM. There are no platform or maintenance fees and a guarantee of no more than 5% increase annually.

Receive the complimentary e-books for the first, second, and third editions with the purchase of the Encyclopedia of Information Science and Technology, Fourth Edition e-book. Plus, take 20% off when purchasing directly through IGI Global's Online Bookstore.

Abstract

Chaos theory was originally developed by mathematicians and physicists. The theory deals with the behaviors of nonlinear dynamic systems. Chaos theory has desirable features, such as deterministic, nonlinear, irregular, long-term prediction, and sensitivity to initial conditions. Therefore, and based on chaos theory features, the security research community adopts chaos theory in modern cryptography. However, there are challenges of using chaos theory with cryptography, and this chapter highlights some of those challenges. The voice information is very important compared with the information of image and text. This chapter reviews most of the encryption techniques that adopt chaos-based cryptography, and illustrates the uses of chaos-based voice encryption techniques in wireless communication as well. This chapter summarizes the traditional and modern techniques of voice/speech encryption and demonstrates the feasibility of adopting chaos-based cryptography in wireless communications.

Multidisciplinary In Chaos Based Cryptography

Multidisciplinary is composed of several separate branches of learning or fields of expertise. These different disciplines (fields) can use chaos theory in their applications as illustrated in Figure 1 (David et al., 2012) .

Figure 1.

Different disciplines (fields) used within the chaos applications

Figure 2 gives the schematic presentation of the chaos behavior. It shows the detail of these applications that exploit the chaos behavior. The behavior of chaos can be seen in the labs, in the nature, in an economics (Kyrtsou & Labys, 2006), in finance (Hristu-Varsakelis & Kyrtsou, 2008), in different other studies such as medical studies (White, 1999), quantum chaos theory study (Berry, 2003), electrical engineering and computer science chaotic systems as well as numerical analysis (Strang, 1991).